44Con 2011 Aug. 30, 2011 to Sept. 2, 2011, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Science and the SDL at Microsoft Alex Lucas Microsoft actively secures its products using the Security Development Lifecycle and through a variety of ...
There's an App for That: Evolving Mobile Security into a Business Advantage Joshua Pennell They watch you sleep, they watch you work, they hold all your personal and professional ...
An approach to multi-regulation compliance Gareth Watkin-jones Multiple compliance targets are a headache and compliance management as a discipline is not well ...
Enabling consumerisation: Managing user-owned devices Matt Adams The launch of the original iPhone in 2007 heralded the arrival of a wave of ...
Information Security and Compliance for the Financial Industry Nahil Mahmood This presentation will provide a holistic view of information security and compliance within the banking ...
IT risk management – A business-driven approach George Quigley This talk will define IT risk management and explore how it relates to business objectives ...
Risk assessment applied to web security Florencio Cano Gabarda MAGERIT is a risk assessment methodology focused in information technologies. As other risk assessment methodologies, ...
Windows Pwn 7 OEM - Owned Every Mobile? Alex Plaskett Thinking about buying a Windows Phone 7 Phone? You need to see this. The talk ...
Smashing the Slack For Fun and Profit The Grugq Finding new places to store secret data is easy. The explosion of applications using structure ...
Hacking Deep Space Paul Marsh This satellite 'hacking' presentation will give you an idea of what is in orbit, and ...
Network Penetration Testing Considered Harmful Today Haroon Meer (Imagine you hire a team of white hot pen-testers, who 0day their way through your ...
USB Flash Drive Forensics Philip Polstra This talk discusses the use of microcontrollers to examine USB mass storage devices. I will ...
Systems Applications Proxy Pwnage Ian De Villiers It has been common knowledge for a number of years that SAP GUI communicates using ...
Maltego and you Roelof ( RT ) Temmingh Open source intelligence is rapidly becoming the most used type of digital intelligence, whether reviewing ...
iOS Forensics: Overcoming iPhone Data Protection Andrey Belenko Data protection is a feature available for iOS 4 devices with hardware encryption: iPhone 4, ...
AndBug -- A Scriptable Debugger for Android's Dalvik Virtual Machine Ilja van Sprundel The Dalvik Virtual Machine supports using Eclipse and JDB to enable developers to debug their ...